CN109204227A - Vehicle shared system and vehicle sharing method - Google Patents

Vehicle shared system and vehicle sharing method Download PDF

Info

Publication number
CN109204227A
CN109204227A CN201810671433.8A CN201810671433A CN109204227A CN 109204227 A CN109204227 A CN 109204227A CN 201810671433 A CN201810671433 A CN 201810671433A CN 109204227 A CN109204227 A CN 109204227A
Authority
CN
China
Prior art keywords
vehicle
key
portable terminal
user authentication
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810671433.8A
Other languages
Chinese (zh)
Inventor
荒川将宏
大矢雅彦
大岛优季
林政树
春名雄郎
春名雄一郎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tokai Rika Co Ltd
Toyota Motor Corp
Original Assignee
Tokai Rika Co Ltd
Toyota Motor Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tokai Rika Co Ltd, Toyota Motor Corp filed Critical Tokai Rika Co Ltd
Publication of CN109204227A publication Critical patent/CN109204227A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/241Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/209Remote starting of engine
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/2036Means to switch the anti-theft system on or off by using the door logic and door and engine unlock means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • G06Q10/025Coordination of plural reservations, e.g. plural trip segments, transportation combined with accommodation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Mechanical Engineering (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides the vehicle shared system and vehicle sharing method of a kind of composition that can simplify vehicle.Vehicle shared system (31) has vehicle sharing means (34).Vehicle sharing means (34) include function of key portion (56) and user authentication function portion (57).Function of key portion (56) is verified by executing via the ID that the electron key (2) with vehicle is similarly handled, and is operated so as to the machine (3) to the vehicle (1) shared by multiple people.When machine (3) is operated by portable terminal (33), user authentication function portion (57) obtains key information (Kd) from external device (ED) (32) and authenticates to key information (Kd) via portable terminal (33), as long as key information authenticates establishment and the use of vehicle in the appointment time, function of key portion (56) are set as effective.Key information (Kd) is generated as the information for only allowing temporarily to use.

Description

Vehicle shared system and vehicle sharing method
Technical field
The present invention relates to vehicle shared systems and vehicle sharing method that multiple people are used in conjunction with 1 trolley.
Background technique
In the past, it there are known to the vehicle shared system (referring to patent document 1,2) that multiple people are used in conjunction with 1 trolley.At this In kind vehicle shared system, such as the shared use of vehicle is carried out to server etc. in advance and is logged in.Then, such as by using Portable terminal (high-performance mobile phone etc.) reserves vehicle, to allow in the appointment time using vehicle.
Existing technical literature
Patent document
Patent document 1: Japanese Unexamined Patent Publication 2016-115077 bulletin
Patent document 2: Japanese Unexamined Patent Publication 2016-71834 bulletin
Summary of the invention
Problems to be solved by the invention
In this vehicle shared system, the use for generally being carried out vehicle on the server using portable terminal is reserved, And reservation information is sent from server to vehicle.But in this composition, communicated because vehicle is needed to have with server Device, so the composition of vehicle is complicated.In addition, when lending vehicle, even with utilizing read/write device The composition of the membership cards such as the IC card that user is held is read, vehicle is also required to have read/write device, this becomes the composition of vehicle It must complicate.
In addition, in the case where for example starting the engine of vehicle by the operation of car key, it may be considered that by vehicle key Spoon keeping is in for example interior glove box etc..In this case, because car key is present in car room, vehicle is possible to It is unlawfully used because car key is stolen.It therefore, is undesirable from the viewpoint of safety.
The vehicle shared system of the composition of vehicle can be simplified the purpose of the present invention is to provide one kind and vehicle is shared Method.
Solution for solving the problem
One embodiment of the present invention is vehicle shared system, wherein has vehicle sharing means, the vehicle sharing means packet Function of key portion and user authentication function portion are included, the function of key portion is by executing via same with the electron key of the vehicle The ID verification of the processing of sample operates so as to the machine to the vehicle shared by multiple people, in the machine by portable terminal When operation, the user authentication function portion is via the portable terminal and from external device (ED) acquirement key information and to the key Information is authenticated, if the key information authenticates establishment and the use of the vehicle in the appointment time, by the key Spoon function part is set as effectively, and the key information is generated as the information for only allowing temporarily to use.
According to this composition, using portable terminal reservation vehicle in use, key information from server via portable Terminal and be sent to vehicle.Therefore, vehicle need not have the function of being communicated with server, if having and portable terminal into The vehicle sharing means of row communication.The composition of vehicle can be simplified as a result,.In addition, using portable terminal operation vehicle When machine, the function of key portion of vehicle sharing means is verified by the ID similarly handle via the electron key with vehicle To be operated to the machine of vehicle.Therefore, vehicle sharing means can be same with the electron key of general electron key system It is acted to sample, it is not necessary to construct new system from the beginning.This point also contributes to simplifying the composition of vehicle.In addition, because using Family can actually be used using portable terminal as car key, so also not needing meeting in such as reason vehicle shared service The IC card such as member's card.Therefore a kind of simple vehicle shared system can be provided.
Another mode of the invention is vehicle sharing method comprising following steps: from external device (ED) to portable terminal The step of assigning the key information for only allowing temporarily to use;By the user authentication function for being arranged at the vehicle sharing means of vehicle Energy portion, from the portable terminal obtain the key information the step of;The key is believed by the user authentication function portion The step of breath is authenticated;The key information certification set up and the vehicle use in the appointment time the case where Under, the function of key portion of the vehicle sharing means is set as effective step;By the function of key portion execute via with The step of ID verification that the electron key of the vehicle is similarly handled;And in the ID executed by the function of key portion In the case that verification is set up, the step of capable of being operated to the machine of the vehicle.
Invention effect
In accordance with the invention it is possible to provide vehicle shared system and the shared side of vehicle of a kind of composition that can simplify vehicle Method.
Detailed description of the invention
Fig. 1 is the composition figure of the vehicle shared system an of embodiment.
Fig. 2 is the flow chart for showing the timing of login process of vehicle sharing means.
Fig. 3 is the flow chart for showing key information certification timing.
Fig. 4 is the flow chart for showing the subsequent timing of key information certification timing of Fig. 3.
Fig. 5 is the flow chart for showing user authentication timing.
Fig. 6 is the flow chart for showing key information re-authentication timing.
Fig. 7 is the flow chart for showing the unlocking motion timing of car door.
Fig. 8 is the flow chart for showing the lock out action timing of car door.
Fig. 9 is the flow chart of timing when showing the engine of starting vehicle.
Figure 10 is the flow chart for showing the timing of log notifier processes.
Figure 11 is the flow chart for showing server connection (when can connect) timing.
Figure 12 is the flow chart for showing server connection (when can not connect) timing.
Figure 13 is the flow chart for showing the timing that vehicle returns processing.
Specific embodiment
Hereinafter, being said according to an embodiment of Fig. 1-Figure 13 to vehicle shared system and vehicle sharing method It is bright.
As shown in Figure 1, vehicle 1 has an electron key system 4, electron key system 4 is wireless by vehicle 1 and electron key 2 Communication carries out the movement that ID is verified thereby executing or allowed machine 3.Electron key system 4 is to be with the communication from vehicle 1 Opportunity and by short-distance wireless communication execute ID verification exempt from key operating system.It is not straight in exempting from key operating system It connects and electron key 2 is operated but carries out ID verification (intelligent checking) automatically.Machine 3 is for example including door locking device 5, hair Motivation 6 etc..
Vehicle 1 has verification ECU (Electronic Control Unit: electronic control unit) 9 as progress ID verification Calibration equipment.In addition, vehicle 1 has vehicle body ECU10 and Engine ECU 11, power supply of the vehicle body ECU10 to onboard electrical element It is managed, Engine ECU 11 controls engine 6.ECU9-11 is electrically connected to each other via interior communication line 12. Communication line 12 is, for example, CAN (Controller Area Network: controller LAN), LIN (Local Interconnect Network: local area communication network).The electronics key for vehicle 1 is logged in the memory 13 of verification ECU9 2 intrinsic electron key ID of spoon.Vehicle body ECU10 controls door locking device 5, and door locking device 5 switches car door 14 Lock locking/unlocking.
Vehicle 1 has: outdoor transmitter 16, can be to outdoor transmission electric wave;Indoor transmitter 17, can be to indoor transmission Electric wave;And electro wave receiver 18, electric wave can be received in vehicle 1.Outdoor transmitter 16 and indoor transmitter 17 are sent The electric wave of LF (Low Frequency: low frequency) wave band.Electro wave receiver 18 receives UHF (Ultra High Frequency: special High frequency) wave band electric wave.The electron key system 4 of this example carries out LF-UHF two-way communication.
Electron key 2 has: key controller portion 21 controls the movement of electron key 2;Receiving unit 22, Electric wave is received in electron key 2;And transmission unit 23, electric wave is sent from electron key 2.Receiving unit 22 can receive LF electric wave. Transmission unit 23 can send UHF electric wave.Memory 24 in key controller portion 21 is logged in the electron key ID of electron key 2.
In vehicle parking, outdoor transmitter 16 sends wake-up signal using LF electric wave.This is entered in electron key 2 When the communication zone of wake-up signal, electron key 2 is made response to wake-up signal and is started from standby mode.Then, it verifies ECU9 is communicated (short-distance wireless communication) via with the electron key 2 having been turned on, and starts the ID verification of referred to as intelligent checking (in this case, outdoor intelligent verifies).The intelligent checking includes the electron key ID for confirming electron key ID correctness Verification and the challenge response certification for using the intrinsic secret key of key (secret key) etc..When electron key ID verification, challenge response certification at Immediately, verification ECU9 is judged as that intelligent checking is set up, and executes or allow the locking solution by the vehicle body ECU10 car door 14 carried out Lock.
It verifies ECU9 and for example detects riding for user using gate controlled switch 27 etc..When detecting that user rides, indoor hair Send device 17 that outdoor transmitter 16 is replaced to send wake-up signal.When electron key 2 receives the wake-up signal, verification ECU9 starts Carry out the ID equally handled when verifying with outdoor intelligent verification (in this case, indoor intelligent verifies).Verify ECU9 When confirming indoor intelligent verification establishment, allow the power supply shape carried out by being arranged at the tail-off 28 near driver's seat The conversion operation (for example, engine start operation) of state.
Vehicle 1 has the vehicle shared system 31 that multiple people are used in conjunction with 1 trolley 1.In this example, vehicle shared system 31 have vehicle sharing means 34, and vehicle sharing means 34 are equipped on shared vehicle, i.e. vehicle 1.Vehicle sharing means 34 have The secret key (the intrinsic secret key of vehicle sharing means) being logged in the key information Kd of portable terminal 33 can be demodulated by having.Portable terminal 33 Encrypted key information Kd is obtained from external device (ED) and key information Kd is logged in into portable terminal 33, so as to as vehicle 1 car key (electron key) is acted.Vehicle sharing means 34 receive key from portable terminal 33 by wireless communication Spoon information Kd, and key information Kd is authenticated.Then, when the certification of key information Kd is set up, the shared dress of vehicle Set operation of the 34 permission portable terminals 33 to on-vehicle machines (machine 3).
Vehicle sharing means 34 are constituted independently relative to the hardware of the electron key system 4 of vehicle 1, are installed in the later period Vehicle 1.Vehicle sharing means 34 are for example defined as only effective electron key in the appointment time, effect and spare key Spoon is identical.The verification ECU9 of electron key system 4 switches the invalidating of electron key function by vehicle sharing means 34, Occur or disappear in vehicle 1 to be confirmed as electron key.Power supply is supplied from the battery+B of vehicle 1 to vehicle sharing means 34。
Server 32 as external device (ED) has server application 37 and key information generating unit 38, and server is answered The movement of vehicle shared system 31 is managed in server 32 with program 37, key information generating unit 38 generates key letter Cease Kd.Key information generating unit 38 is for example by 1 or multiple processors of execute server application program 37 in server 32 In functionally realize.Key information generating unit 38 for example accepts vehicle via network communication from portable terminal 33 in server 32 When 1 use reservation, key information Kd is generated.Key information Kd is generated as the information for only allowing temporarily to use.For example, Key information Kd is generated as expendable disposable key is only allowed.
Server 32 has database 39, is logged in the required various letters when issuing key information Kd in database 39 Breath.Be logged in following information in database 39: key information Kd is generated by key information generating unit 38;Customer information (client Information D1), log in vehicle shared system 31;Information (information of vehicles D2) relevant to the vehicle 1 shared by multiple people;With And information (vehicle sharing means information D3) relevant to the vehicle sharing means 34 of vehicle 1.
Portable terminal 33 has: terminal control portion 42 controls the movement of portable terminal 33;Network communication module 43, it can be carried out the network communication of portable terminal 33;Near radio module 44 makes portable terminal 33 can be carried out short distance nothing Line communication;And memory 45, data can be rewritten.Wireless near field communication is, for example, bluetooth (Bluetooth: registered trademark) Communication.
Portable terminal 33 has user-interface application program 46 and shared processing unit 47, and user-interface application program 46 is just It takes in terminal 33 and the movement of vehicle shared system 31 is managed;Shared processing unit 47 executes vehicle 1 in portable terminal 33 Shared processing.Shared processing unit 47 is for example functionally real by the terminal control portion 42 of execution user-interface application program 46 It is existing.It is logged in user authentication key in the memory 45 of portable terminal 33, user authentication key be used to use portable terminal The coded communication carried out when the machine 3 of 33 pairs of vehicles 1 operates.User authentication key for example can by each generate its It is worth the generating random number of variation.User authentication key can be logged in advance in vehicle shared system 31 or can also be each Required component is logged in using generating when vehicle 1.
Vehicle sharing means 34 have: controller 50 controls the movement of vehicle sharing means 34;Intelligence communication Module 51 makes vehicle sharing means 34 can be carried out intelligence communication;Near radio module 52 enables vehicle sharing means 34 Carry out wireless near field communication;Memory 53 can rewrite data;And timer portion 54, in vehicle sharing means 34 Date and time is managed.Vehicle sharing means information D3 is included, vehicle is logged in advance in memory 53 to share Device ID and the intrinsic secret key of vehicle sharing means.Timer portion 54 is for example made of software timer.
Vehicle sharing means 34 have function of key portion 56 and user authentication function portion 57.As an example, key function Energy portion 56 and user authentication function portion 57 are stored in the 1 of 1 or more program of the storage regions such as memory 53 by execution Functionally realization of a or multiple processors as controller 50, but not limited to this.Function of key portion 56 is logical by intelligence Believe module 51 and communicated with verification ECU9 is carried out, verifies (in this case, it is intelligent checkings) thereby executing ID.The key function Energy portion 56 executes ID verification by executing the same processing carried out with electron key 2, so as to the vehicle shared by multiple people 1 machine 3 is operated.
User authentication function portion 57 executes wirelessly when remotely operating machine 3 using portable terminal 33 with portable terminal 33 Communication.When operating machine 3 using portable terminal 33, from external device (ED), (in this case, it is services in user authentication function portion 57 Device 32) key information Kd is obtained via portable terminal 33 and key information Kd is authenticated, if key information Kd's recognizes It demonstrate,proves establishment and the use of vehicle 1 in the appointment time, then function of key portion 56 is set as effective.
Then, the effect of vehicle shared system 31 and effect are illustrated with Fig. 2-Figure 13.
The timing of the login process of vehicle sharing means 34 is illustrated in Fig. 2.The login process of vehicle sharing means 34 is being incited somebody to action Vehicle sharing means 34 are carried out when being equipped on vehicle 1, and are carried out using dedicated key log in means 60.By using The key log in means 60 connecting with vehicle 1 executes register, so that vehicle sharing means 34 are logged in vehicle 1.
In step s101, vehicle sharing means 34, server application 37 and key log in means 60 are in key It is opportunity that spoon log in means 60, which has input vehicle sharing means logging request, starts the login process of vehicle sharing means 34.? In this example, vehicle sharing means 34, server application 37 and key log in means 60 will be affixed to respectively during fabrication The vehicle ID for the vehicle 1 that the vehicle sharing means ID of a vehicle sharing means 34 is logged with vehicle sharing means 34 is closed Connection.Vehicle ID is, for example, vehicle identification number.
In step s 102, key log in means 60, which executes, logs in operation.In the login operation, it will be logged in verification The intrinsic secret key of electron key ID and key of ECU9 logs on to vehicle sharing means 34.The login operation preferably for example passes through Vehicle-mounted anti-theft locking system of engine and be performed.In anti-theft locking system of engine, such as utilize RFID (Radio FrequencyIdentification: radio frequency identification) etc. wireless near field communications and confirm label (in this case, it is vehicle is total Enjoy device 34) it is whether correct.In addition, when electron key 2 is logged in verification ECU9, it is logical also by the engine anti-theft locking Believe and executes.
The login operation of vehicle sharing means 34 using key log in means 60 carry out log in starts to operate, and pass through by Vehicle sharing means 34 cover the near radio antenna (illustration omitted) of the anti-theft locking system of engine of vehicle 1 and are held Row.In this case, information is obtained request by the communication network of anti-theft locking system of engine by vehicle sharing means 34 It is sent to verification ECU9.Verification ECU9 will be logged in verification when receiving information acquirement request from vehicle sharing means 34 The intrinsic secret key of electron key ID and key of ECU9 returns back to vehicle by the communication network of anti-theft locking system of engine and is total to Enjoy device 34.The intrinsic secret key write-in storage of electron key ID and key that vehicle sharing means 34 will be received from verification ECU9 Device 53.
Key information certification timing is illustrated in Fig. 3 and Fig. 4.The authentication processing of key information Kd is in vehicle 1, service It is carried out between device 32 and portable terminal 33.
In step s 201, it when carrying out when starting operation of authentication processing using portable terminal 33, shares the starting of processing unit 47 and uses Family interface application 46.
In step S202, key information generating unit 38 and shared processing unit 47 execute the user that vehicle 1 is reserved in confirmation User authentication.In the case of this example, in the user authentication, implement the certification of User ID and password and log in want in advance Formality is reserved in the use of vehicle 1 about.User ID is that the intrinsic of each user is given to when logging on to vehicle shared system 31 ID.Password is made of the number that user oneself sets when logging on to vehicle shared system 31, text.Carry out User ID and When the certification of password, by User ID and Password Input to portable terminal 33, by network communication by User ID and password It is sent to server 32.Key information generating unit 38 is by comparing the User ID and password sum number received from portable terminal 33 User authentication is carried out according to the customer information D1 in library 39, continues to handle if authenticating establishment, is forced if certification is invalid It ends processing.
Vehicle 1, the date and time etc. reserved are inputted in using reservation formality.When completion uses the input of reservation When, share processing unit 47 by network communication by the intrinsic Termination ID of portable terminal 33 and reservation vehicle 1, day of appointment when Between etc. various information be sent to server 32 together.
In step S203, completing user authentication, (certification of User ID and password uses reservation to shared processing unit 47 Formality) when, the downloading of key information Kd is requested to be sent to server 32 by network communication.
In step S204, key information generating unit 38 receives key information downloading in the state that user authentication is set up When request, key information Kd is generated.At this point, the vehicle for the reservation vehicle 1 that key information generating unit 38 is notified from portable terminal 33 Information D2, which is deduced, to be equipped on the intrinsic secret key of vehicle sharing means 34 of reservation vehicle 1 (vehicle sharing means is inherently close Spoon).In addition, the intrinsic secret key of vehicle sharing means and shared vehicle 1 have one-to-one relationship.
Key information generating unit 38 generates key information Kd using the intrinsic secret key of vehicle sharing means.As an example Son, key information generating unit 38 use ciphering type (encryption logic), such as will include " day of appointment and time ", " terminal ID ", " time information Tx " and " count value Cx " text (encryptionization information) combination " the intrinsic secret key of vehicle sharing means " and The encryption text of generation is obtained as key information Kd, but not limited to this.As described above, day of appointment and time and Termination ID It is obtained by user authentication process from portable terminal 33.Time information Tx be used for adjust be set in timer portion 54 when Carve, indicate management server 32 it is correct at the time of.Count value Cx is being generated every time for preventing reusing for key information Kd Such as incremental count (count up) when key information Kd.
In step S205, generated key information Kd is sent to just by key information generating unit 38 by network communication Take terminal 33.
In step S206, processing unit 47 is shared by the key information Kd received from server 32, memory 45 is written.The key Spoon information Kd is only effective in the appointment time.
In step S207 shown in Fig. 4, the near radio between portable terminal 33 and vehicle sharing means 34 is established Communication.As an example, processing unit 47 and user authentication function portion 57 are shared in order to establish BLE (Bluetooth Low Energy: Bluetooth Low Energy) it communicates and executes communication connection, but not limited to this.In this case, user authentication function portion 57 (vehicle sharing means 34) regularly send broadcast packet (advertising packet).Here, being set as user in subscription time It is interior close to vehicle 1.It, will when shared processing unit 47 (portable terminal 33) receives broadcast packet in the subscription time using vehicle 1 Communication connection request is sent to vehicle sharing means 34.User authentication function portion 57 (vehicle sharing means 34) is from portable terminal 33 when receiving communication connection request, and the communication connection confirmation of notice communication establishment is sent to portable terminal 33.As a result, just It takes and establishes BLE communication between terminal 33 and vehicle sharing means 34.
In step S208, request is logged in the key of the key information Kd of portable terminal 33 by user authentication function portion 57 Spoon information request is sent to portable terminal 33.The use that key information request can be defined as vehicle 1 (shared vehicle) starts to ask It asks.
In step S209, shared processing unit 47 makes response to key information request, and key information Kd is sent to vehicle Sharing means 34.Key information Kd uses scheduled secret key (such as the vehicle sharing means being logged in vehicle shared system 31 Intrinsic secret key) it is encrypted and is sent to vehicle sharing means 34.In addition, shared processing unit 47 is gone back together with key information Kd The Termination ID of portable terminal 33 is notified to vehicle sharing means 34.
In step S210, shared processing unit 47 and user authentication function portion 57 execute and have used recognizing for key information Kd Demonstrate,prove operation.At this point, the confirmation of user authentication function portion 57 uses scheduled secret key (such as the vehicle being logged in vehicle shared system 31 The intrinsic secret key of sharing means) whether the demodulation of key information Kd that carries out succeed.If the demodulation success of key information Kd, when It is encrypted at the key information Kd that will be obtained from portable terminal 33 with correct secret key, user authentication function portion 57 is judged as certification Success.Then, if authenticating successfully, user authentication function portion 57 obtain key information Kd included " day of appointment and time ", " Termination ID ", " time information Tx " and " count value Cx ".On the other hand, it if certification is invalid, is used as key information Kd Illegal secret key is encrypted, and user authentication function portion 57 is judged as authentification failure, and stops the connection of BLE communication.
User authentication function portion 57 is identified through the count value Cx for authenticating operation and obtaining.At this point, if current count value Cx1 Greater than the last count value Cx2 for being stored in vehicle sharing means 34, user authentication function portion 57 is then judged as that communication is legal Ground carries out and continues to handle.On the other hand, if current count value Cx1 is last time count value Cx2 hereinafter, user authentication function Energy portion 57 is then judged as that key information is possible to be reused and stop the connection of BLE communication.
In addition, user authentication function portion 57 executes Termination ID certification, Termination ID authenticate-acknowledge is obtained by certification operation Whether Termination ID is correct.In the case of this example, vehicle sharing means 34 take by comparing in certification operation (demodulation process) The Termination ID obtained and the Termination ID directly obtained from portable terminal 33, thereby executing Termination ID certification.Then, user authentication function Portion 57 is judged as that communication legally carries out and continues to handle, user authentication function portion 57 exists when Termination ID is authenticated and set up When Termination ID certification is invalid, it is judged as that Termination ID is possible to unlawfully obtain and stop the connection of BLE communication.
User authentication function portion 57 adjusts vehicle sharing means using information Tx at the time of acquirement by authenticating operation At the time of 34 timer portion 54 (date and time).In the case where timer portion 54 is for example made of software timer, meter When device portion 54 at the time of be easy error, when unloading the battery of vehicle 1, its moment is reset.In view of this point, according to believing constantly Tx is ceased, timer portion 54 at the time of is set to correct date and time.
The current date and time obtained from timer portion 54 in the appointment time and BLE communication be connection status when, User authentication function portion 57 then continues to handle.On the other hand, if existing from the current date and time that timer portion 54 obtains Outside subscription time or the connection of BLE communication stops, and user authentication function portion 57 then forces to end processing.
In step S211, user authentication function portion 57 notifies user authentication key to portable terminal 33.At this point, user Certification key is encrypted simultaneously using the secret key (such as the intrinsic secret key of vehicle sharing means) being logged in vehicle shared system 31 Portable terminal 33 is sent to from vehicle sharing means 34.By notifying user authentication key to portable terminal 33, thus later It could be used that user authentication key in the coded communication carried out between portable terminal 33 and vehicle sharing means 34.Portable terminal The user authentication key of 33 pairs of encryptedization received from vehicle sharing means 34 demodulates, and user authentication key is protected It is stored in memory 45.
In step S212, shares processing unit 47 and send function of key unlatching request (function of key control request).Key Function is opened request (function of key control request) and is encrypted and sent out using the secret key being logged in vehicle shared system 31 It send to vehicle sharing means 34.Function of key opens request as the function of key portion 56 of vehicle sharing means 34 to be set as The request of effect.
In step S213, user authentication function portion 57 to function of key open request make response and by function of key portion 56 are set as effective.The function of key portion 56 of vehicle sharing means 34 can carry out LF-UHF two-way communication with verification ECU9 as a result,.
In step S214, the log that function of key is opened in user authentication function portion 57 carries out incremental count.
In step S215, function of key of the user authentication function portion 57 as the result of the action for indicating function of key control request Control notifies and function of key is opened notice and is sent to portable terminal 33.Function of key opens notice, and (function of key control is logical Know) it is encrypted using the secret key being logged in vehicle shared system 31 and is sent to portable terminal 33.Pass through function of key Notice is opened, and notifies function of key portion 56 to become effective to portable terminal 33.Shared processing unit 47 is from vehicle sharing means 34 receive function of key open notice when, be transferred to certification completion status.
In step S216, user authentication function portion 57 carries out the successful log of the certification of key information Kd to be incremented by meter Number.
In step S217, key information Kd and user authentication key are stored in the shared dress of vehicle by user authentication function portion 57 Set 34 memory 53.Then, user authentication function portion 57 is transferred to certification completion status.In addition, vehicle sharing means 34 exist When as certification completion status, the lending mark (illustration omitted) for being held in memory 53 is set as indicating in use Value.Vehicle sharing means 34 can be carried out the operations such as the locking unlock of car door 14, the starting of engine 6 as a result,.
User authentication timing is illustrated in Fig. 5.The processing of Fig. 5 has been logged in key information Kd in use and user recognizes Demonstrate,prove the portable terminal 33 of key when being operated (car door locking unlock, engine start) to vehicle 1, make portable terminal 33 with And vehicle sharing means 34 are performed when being transferred to " certification completion status ".
In step S301, processing unit 47 and user authentication function portion 57 are shared in order to establish BLE (Bluetooth Low Energy) it communicates and executes communication connection.Because the processing of step S301 is identical as above-mentioned steps S207, omission is said It is bright.
In step s 302, it shares processing unit 47 and user authentication function portion 57 executes use and is logged and shares in vehicle The challenge response of the secret key (hereinafter, also known as old secret key) of device 34 authenticates.Old secret key is used when upper primary BLE is communicated Secret key.As long as old secret key has been logged in the key of vehicle shared system 31, any one secret key can be.User recognizes It demonstrate,proves function part 57 and generates random number, random number is sent to portable terminal 33.
In step S303, vehicle is shared dress using the old secret key pair for having logged in portable terminal 33 by shared processing unit 47 It sets the random number that 34 receive to be encrypted, to generate response coding.Then, processing unit 47 is shared to compile generated response Code is sent to vehicle sharing means 34.
In step s 304, user authentication function portion 57 executes response check, and response check refers to confirmation from portable terminal Whether 33 responses received encode correct.It has been logged here, user authentication function portion 57 uses in vehicle sharing means 34 Old secret key pair random number encrypted and generate response coding, pass through to the response encode and from portable terminal 33 obtain sound It should encode and be compared, and execute response check.
In step S305, user authentication function portion 57 response check set up when, generate new user authentication key (with Under, also known as new user authentication key).New user authentication key for example can be by the random number of its value variation in each generate And it generates.
In step S306, generated new user authentication key is sent to portable terminal by user authentication function portion 57 33.New user authentication key is encrypted using the secret key being logged in vehicle shared system 31, and from vehicle sharing means 34 It is sent to portable terminal 33.The new user authentication key received from vehicle sharing means 34 is stored in just by shared processing unit 47 Take the memory 45 of terminal 33.
In step S307, generated new user authentication key is temporarily stored in vehicle and is total to by user authentication function portion 57 Enjoy the memory 53 of device 34.
Then, in following step S308-S311, processing identical with above-mentioned steps S212-S215 is executed.
In step S312, the successful log of user authentication is carried out incremental count by user authentication function portion 57.
In step S313, generated new user authentication key is saved (formal to log in) in storage by user authentication function portion 57 Device 53.Then, portable terminal 33 and vehicle sharing means 34 are transferred to certification completion status.In addition, in new user authentication key (step S306-S311 in this example) BLE connection is cut off in the replacement timing of spoon, when being automatically reconnected later, using old close The both sides of spoon and new user authentication key carry out response check.
Key information re-authentication timing is illustrated in Fig. 6.This is to the user authentication for having logged in portable terminal 33 Key is lending the countermeasure that the case where disappearing uses in vehicle 1.
In step S401, such as when starting operation of the re-authentication of key information Kd is being carried out using portable terminal 33, altogether It enjoys processing unit 47 and starts user-interface application program 46.
In step S402, key information generating unit 38 and shared processing unit 47 execute user authentication, and user authentication is true Recognize the user for carrying out the re-authentication of key information Kd.In the case of this example, in the user authentication execute User ID and The certification of password and generate the key information Kd issued in advance again re-issue formality.The certification of User ID and password because It is identical as the processing of above-mentioned steps S202, so omitting the description.If the certification of the User ID and password is set up, allow to send out again Row formality.Re-issuing formality is the behaviour re-issued for starting key information Kd (disposable key) on the picture of portable terminal 33 Make.
Then, in step S403-S406, by processing identical with above-mentioned steps S203-S206, and key letter is executed Cease the generation and keeping of Kd.
In step S 407, processing unit 47 and user authentication function portion 57 are shared when portable terminal 33 is located near vehicle 1, BLE communication is connected, executes the re-authentication of key information Kd later.
In step S408, user authentication function portion 57 generates to carry out using being logged in vehicle sharing means 34 The challenge response of secret key authenticates and the random number that uses.The processing of step S408 is processing identical with above-mentioned steps S302. Then, generated random number is sent to portable terminal 33 by user authentication function portion 57.
In step S409, the key information re-authentication that processing unit 47 will request the re-authentication of key information Kd is shared Request is sent to vehicle sharing means 34.At this point, usually shared processing unit 47 is by receiving random number from vehicle sharing means 34 Generation respond coding, but because user authentication key disappear cannot generate response encode.Therefore, processing unit 47 is shared The request of key information re-authentication is sent to vehicle sharing means 34.
In step S410, user authentication function portion 57 to key information re-authentication request make response, and execute general Key information Kd is notified to the processing of portable terminal 33.Because the processing of step S410 is identical as above-mentioned steps S208-S217 Processing, so omitting the description.Then, if the processing of step S410 correctly terminates, portable terminal 33 and the shared dress of vehicle It sets 34 and is transferred to certification completion status.
The unlocking motion timing of car door 14 is illustrated in Fig. 7.In the car door 14 using portable terminal 33 to lock state When being unlocked, unblock button 65 is shown on the picture of portable terminal 33 using user-interface application program 46.
In step S501, the solution on the picture that processing unit 47 confirms portable terminal 33 in the case where authenticating completion status is shared When lock button 65 is operated, unlocking request is sent to vehicle sharing means 34 as key operation requests.Unlocking request is The request that the unlocking motion of car door 14 is requested to vehicle sharing means 34, using being logged in the scheduled of vehicle shared system 31 Secret key is encrypted and is sent.
In step S502, function of key portion 56 utilizes the UHF of the communication network (UHF communication) via vehicle sharing means 34 Electric wave, and the unlocking request including electron key ID is sent to verification ECU9 from intelligent communication module 51.
In step S503, verification ECU9 is receiving the solution sent from vehicle sharing means 34 using electro wave receiver 18 When lock request, unlocking request is sent to vehicle body ECU10 by communication line 12.
In step S504, vehicle body ECU10 makes response to the unlocking request for carrying out self checking ECU9, controls door locking device 5 and so that car door 14 is switched to unlocked state from lock state.Car door 14 is unlocked as a result, to allow to take to car.
In step S505, user authentication function portion 57 makes the reception of the unlocking request from portable terminal 33 and answers It answers, incremental count is carried out to unlocking request log.
In step S506, unlock is sent notice as key controller notice and is sent to portable terminal by user authentication function portion 57 33.Unlock, which sends notice, indicates that unlocking request is sent to verification ECU9 by vehicle sharing means 34.Unlock sends notice and uses The scheduled secret key in vehicle shared system 31 is logged to be encrypted and be sent to portable terminal 33.Shared processing unit 47 exists When receiving unlock transmission notice from vehicle sharing means 34, show that the transmission of unlocking request is complete on the picture of portable terminal 33 At information.
The lock out action timing of car door 14 is illustrated in fig. 8.Using portable terminal 33 to car door in the unlocked state 14 when being locked, and shows locking press button 66 in portable terminal 33 by user-interface application program 46.
In step S511, the lock on the picture that processing unit 47 confirms portable terminal 33 in the case where authenticating completion status is shared When determining button 66 and being operated, locking request is sent to vehicle sharing means 34 as key operation requests.Locking request is The request that the lock out action of car door 14 is requested to vehicle sharing means 34, using being logged in the scheduled of vehicle shared system 31 Secret key is encrypted and is sent.
In step S512, function of key portion 56 utilizes the UHF of the communication network (UHF communication) via vehicle sharing means 34 Electric wave, and the locking request including electron key ID is sent to verification ECU9 from intelligent communication module 51.
In step S513, verification ECU9 receives the locking sent from vehicle sharing means 34 using electro wave receiver 18 When request, locking request is sent to vehicle body ECU10 by communication line 12.
In step S514, vehicle body ECU10 makes response to the locking request for carrying out self checking ECU9, controls door locking device 5 and so that car door 14 is switched to lock state from unlocked state.Car door 14 is locked as a result, so that vehicle 1 becomes dead ship condition.
In step S515, user authentication function portion 57 makes the reception of the locking request from portable terminal 33 and answers It answers, incremental count is carried out to the log of locking request.
In step S516, locking is sent notice as key controller notice and is sent to portable terminal by user authentication function portion 57 33.Locking, which sends notice, indicates that locking request is sent to verification ECU9 by vehicle sharing means 34.Locking sends notice and uses The scheduled secret key in vehicle shared system 31 is logged to be encrypted and be sent to portable terminal 33.Shared processing unit 47 exists When receiving locking transmission notice from vehicle sharing means 34, the transmission of locking request has been shown on the picture of portable terminal 33 The information of completion.
The timing when starting the engine 6 of vehicle 1 is illustrated in Fig. 9.When starting engine 6, such as user one Side carries out the tail-off 28 that brake operation presses driver's seat on one side.
In step S521, verification ECU9 is confirming the operation that tail-off 28 has been carried out together with brake operation When, intelligence communication is carried out with the function of key portions 56 of vehicle sharing means 34, thus with the ID that carries out in electron key system 4 The ID that verification similarly executes vehicle sharing means 34 verifies (intelligent checking).At this point, verification ECU9 is using LF electric wave and from room Interior transmitter 17 sends wake-up signal.Then, if vehicle sharing means 34 are when function of key portion 56 receives wake-up signal Completion status is authenticated, function of key portion 56 then carries out intelligent checking (indoor intelligent verification) by the communication with verification ECU9. In the intelligent checking, in the same manner as the intelligent checking of electron key 2, verifies ECU9 and function of key portion 56 executes and is logged In the verification of the electron key ID of the memory 53 of vehicle sharing means 34, inherently close using the key being logged in memory 53 Challenge response certification of spoon etc..Then, verification ECU9 allows to start engine 6 when confirming intelligent checking establishment.
In step S522, verification ECU9 is exported engine start request to Engine ECU 11 by communication line 12.
In step S523, Engine ECU 11 is made response to the engine start request for carrying out self checking ECU9 and is started Engine 6.
The timing of log notifier processes is illustrated in Figure 10.In this example, the progress of portable terminal 33 log acquirement operation, and from Vehicle sharing means 34 obtain log, and the log obtained is sent to server 32.
In step s 601, processing unit 47 is shared when detecting that log obtains the triggering started under authenticating completion status, Log is obtained into request and is sent to vehicle sharing means 34.Log obtain for example using portable terminal 33 carry out obtain start to grasp Make or as the acquirement period periodically to arrive when is performed.Log is obtained to request to use and is logged in vehicle shared system 31 Scheduled secret key is encrypted and is sent.
In step S602, user authentication function portion 57 is based on when receiving log acquirement request from portable terminal 33 Log notice is generated in the log information of vehicle sharing means 34 by keeping.Log notice is by keeping in vehicle sharing means The combination of 34 log information, can notify for example which type of type (function of key open, key information authenticate successfully, user Authenticate successfully, unlocking request, locking request, engine start etc.) log is when to be taken care of.
In step S603, log notice is sent to portable terminal 33 by user authentication function portion 57.Log notice uses The scheduled secret key in vehicle shared system 31 is logged to be encrypted and be sent to portable terminal 33.
In step s 604, the log received from vehicle sharing means 34 is passed through into network in shared processing unit 47 It communicates and is sent to server 32.Log notice is encrypted using the scheduled secret key being logged in vehicle shared system 31 And it is sent to server 32.
In step s 605, server 32 will be believed the log received according to the log notice from portable terminal 33 Breath is stored in memory (database 39 etc.).Log (use state) conduct for the vehicle 1 being shared in server 32 as a result, It records and saves.
In step S606, user authentication function portion 57 will be taken care of after log notice is sent to portable terminal 33 It is removed in the log of vehicle sharing means 34.Vehicle sharing means 34 are avoided still to maintain log as a result,.
Server connection (when can connect) timing is illustrated in Figure 11.Server connection is for example for the shared dress of vehicle Whether the use for setting 34 confirmation vehicles 1 is performed in the appointment time.
In step s 701, processing unit 47 is shared when becoming server connection timing under authenticating completion status, will be serviced Device connection request (external device (ED) connection request) is sent to vehicle sharing means 34.Server connection request use is logged in vehicle The scheduled secret key of shared system 31 is encrypted and is sent.
In step S702, user authentication function portion 57 generates and obtains ID at the time of being certified in server connection.When Carving acquirement ID can for example be generated by the random number of its value variation in each send.
In step S703, user authentication function portion 57 is sent to portable terminal 33 for request is obtained constantly, and the moment obtains request Server 32 is requested to provide time information Tx.Moment obtains to request to use and be logged in the scheduled close of vehicle shared system 31 Spoon is encrypted and is sent.In addition, the moment obtains request other than obtaining request command constantly, it further include being shared by vehicle Device 34 obtains ID at the time of generation.
In step S704, shared processing unit 47 obtains request at the time of coming from vehicle sharing means 34 and is led to by network Believe and is sent to server 32.
In step S705, server 32 (server application 37) executes illegal benefit when receiving acquirement request constantly With confirmation.Illegal using in confirmation, such as based on being stored in log information, other notices etc. of server 32, and confirm The resume for whether thering is vehicle 1 to be illegally used.
In step S706, server 32 obtains server moment (date and time being managed with server 32), Time information Tx is generated based on the server moment.Then, server 32 generates moment notification information, by the moment notification information It is sent to portable terminal 33, moment notification information includes time information Tx.The moment notification information use is logged in vehicle The scheduled secret key of shared system 31 is encrypted and is sent.In addition, moment notification information includes time information Tx, further include ID is obtained at the time of from vehicle sharing means 34.
In step S707, notification information is sent to the shared dress of vehicle at the time of shared processing unit 47 will come from server 32 Set 34.
In step S708, user authentication function portion 57 by will by user authentication function portion 57 generate at the time of obtain ID and from ID is obtained at the time of server 32 obtains to be compared, and is executed the moment and obtained ID verification.If at this point, user authentication function portion 57 Moment obtains ID verification and sets up, then continues to handle, if the moment obtains, ID verification is invalid, and pressure ends processing.
In step S709, user authentication function portion 57 is based on from notification information at the time of the acquirement of server 32 and to timing It is adjusted at the time of device portion 54.
In step S710, user authentication function portion 57 executes illegal utilize and confirms.In the illegal utilization confirmation, such as Based on log information, other notices etc. for being stored in vehicle sharing means 34, it is confirmed whether the shoe for having vehicle 1 illegally to use It goes through.
In step S711, notification information executes subscription time verification at the time of user authentication function portion 57 is based on obtaining. In the case of this example, confirmation " reservation start time "≤" at the time of moment notification information "≤" reservation finish time " whether at It is vertical.If the condition is set up, user authentication function portion 57 is judged as that subscription time verification is set up, and continues to handle.On the other hand, If the condition is invalid, function of key portion 56 is set as by the cutting communication of user authentication function portion 57 (in this case, it is BLE communications) In vain, key information Kd is removed, and lending mark is set as unused.
Server connection (when can not connect) timing is illustrated in Figure 12.The timing is for vehicle sharing means 34 Moment notification information is obtained from server 32 via portable terminal 33 to connect to attempt server, but server connection failure When the processing that is performed.In addition, being omitted the description because step S801-S804 is identical as above-mentioned steps S701-S704.
In step S805, if if cannot be received in the given time will obtain constantly after request is sent to server 32 To moment notification information, shared processing unit 47 then thinks server connection failure.Then, it shares processing unit 47 and is confirming service When device connection failure, the server connection failure for notifying failure notice is sent to vehicle sharing means 34.Server connection Failure notification is encrypted using the scheduled secret key being logged in vehicle shared system 31 and is sent.
In step S806, user authentication function portion 57 executes the subscription time school for being confirmed whether to use in the appointment time It tests.In this, it is assumed that user authentication function portion 57 thinks subscription time school in the case where being indeterminate state at the time of timer portion 54 Test establishment.At this point, at the time of if user authentication function portion 57 considers the timer portion 54 of the clocking error in timer portion 54 Then it is judged as that subscription time verification is set up in subscription time.On the other hand, if consider the timer portion 54 of clocking error when It is not judged as that subscription time verification is invalid quarter then in the appointment time.In the case where subscription time verification is invalid, user The cutting communication of authentication function portion 57 (in this case, it is BLE communications), function of key portion 56 is set as in vain, and key information Kd is clear It removes, and lending mark is set as unused.In this way, even if server cannot be connected, it also can be by based on timer portion 54 Time confirms subscription time, so as to improve safety.
Vehicle is illustrated in Figure 13 returns timing.Vehicle is returned after for example locking car door 14, by portable end Return button 67 is operated on the picture at end 33 and is carried out.
In step S901, user is executed to car door 14 into line-locked door locking processing.Because this locking processing is in Fig. 8 Step S511-S516 shown in handle, so omitting the description.
In step S902, processing unit 47 is shared after the locking processing for executing car door 14, confirms portable terminal 33 When return button 67 on picture is operated, it will indicate that the return notice that request vehicle 1 is returned is sent to vehicle sharing means 34. Notice is returned to be encrypted and sent using the scheduled secret key being logged in vehicle shared system 31.
In step S903, user authentication function portion 57 is when receiving return notice from portable terminal 33, by key function Energy portion 56 is set as invalid.Function of key portion 56 stops as a result, and cannot execute intelligence communication.
In step S904, the log that notice is returned in 57 pairs of user authentication function portion carries out incremental count.
In step S905, user authentication function portion 57 will indicate to have known that the return response that vehicle 1 is returned is communicated by BLE It is sent to portable terminal 33.Response is returned to be encrypted and sent out using the scheduled secret key being logged in vehicle shared system 31 It send.
In step S906, shared processing unit 47 is made response to the return response from vehicle sharing means 34 and will be led to Believe (BLE communication) cutting.Then, share processing unit 47 will be stored in portable terminal 33 memory 45 key information Kd with And information (user authentication key in this example) relevant to key information Kd is deleted.It is thus impossible to right using portable terminal 33 The machine 3 of vehicle 1 is operated.
In step s 907, portable terminal 33 and server 32 execute return processing.In return processing, vehicle is indicated 1 information returned is notified from the shared processing unit 47 of portable terminal 33 to server 32.32 (server of server as a result, Application program 37) it is judged as that the vehicle 1 of lending has been returned.
Vehicle shared system 31 described above has the following advantages that.
In vehicle shared system 31, use portable terminal 33 reserve vehicle 1 in use, key information Kd as reservation letter It ceases and is sent to vehicle 1 from server 32 via portable terminal 33.Therefore, vehicle 1 need not have is communicated with server 32 Function, as long as having the vehicle sharing means 34 communicated with portable terminal 33.The structure of vehicle 1 can be simplified as a result, At.In addition, because reservation information is sent to portable as the key information Kd (the key information Kd of encryptionization) without certification Terminal 33, so key information Kd can be securely attached to portable terminal 33.In addition, operating vehicle using portable terminal 33 When 1 machine 3, ID that the function of key portion 56 of vehicle sharing means 34 is equally handled by the electron key 2 with vehicle 1 Verification, so that the machine 3 to vehicle 1 operates.Therefore, vehicle sharing means 34 can be carried out and general electron key system In electron key similarly act, it is not necessary to construct new system from the beginning.This point helps to simplify the composition of vehicle 1.Separately Outside, because user actually can use portable terminal 33 as car key, such as when using vehicle shared service The IC card such as membership card are not needed yet.Therefore, simple vehicle shared system 31 can be provided.
In addition, in the case where the operation by car key starts engine 6 of vehicle 1, such as can be by car key Keeping is in interior glove box etc..In this case, because car key is present in car room, vehicle is possible to because of vehicle Key is stolen and is unlawfully used.Therefore, it is not preferred from the viewpoint of safety.This point, in this example, because will just It takes terminal 33 to use as car key, so need not be by car key keeping in car room, not having the stolen worry of car key.
Key information Kd is generated as the disposable key using 1 time is only allowed.Therefore, it can be improved the use of vehicle 1 When safety.
Key information Kd is encrypted using the intrinsic intrinsic secret key of vehicle sharing means of vehicle sharing means 34.Cause This can improve key information Kd being attached to the shared dress of vehicle because key information Kd is sent using coded communication Safety when setting 34.
Key information Kd is generated by network communication by the shared server 32 being managed to vehicle 1.Therefore, Key information Kd safely can be generated by server 32.
Function of key portion 56 by electron key system 4 carry out the coded communication used when ID verification in portable terminal The encrypted communication function that the machine 3 of 33 operation vehicles 1 carries out between user authentication function portion 57 and portable terminal 33 when operating Property it is separated.Therefore, even if the secret key of the coded communication for the side being used in these coded communications is stolen, because the secret key is not Other coded communications can be used for, so safety when can be further improved using vehicle 1.
Key information Kd includes count value Cx, and count value Cx be used to detect reservation and repeat.User authentication function portion 57 exists When portable terminal 33 operates the machine 3 of vehicle 1, confirms the count value Cx of key information Kd and judge whether that vehicle 1 can be used. Therefore, it is which time generates that key information Kd is managed according to count value Cx, so the benefit again of key information Kd can be prevented With.
Key information Kd includes information Tx at the time of notifying present date and time.Vehicle sharing means 34 include being used for It is confirmed whether it is the timer portion 54 of subscription time.User authentication function portion 57 be based on key information Kd at the time of information Tx and adjust At the time of whole timer portion 54.Therefore, the countermeasure altered at the time of capable of taking to timer portion 54.
Key information Kd includes the Termination ID of the portable terminal 33 used as vehicle electronic key.User authentication function Termination ID of the portion 57 based on key information Kd and confirm whether portable terminal 33 is used for the use of vehicle 1.Therefore, vehicle is being used The Termination ID that portable terminal 33 is confirmed when 1, so safety when can be further improved using vehicle 1.
When the user authentication key for the coded communication being used between portable terminal 33 and vehicle sharing means 34 disappears, Portable terminal 33 obtains key information Kd from server 32 by the formality of re-issuing of key information Kd again, to step on again It records user authentication key (processing of Fig. 6).Therefore, even if the user authentication key of portable terminal 33 disappears, key can also be passed through Spoon information Kd's re-issues formality and user authentication key is logged on to portable terminal 33 again.
User authentication function portion 57 can will be notified via portable terminal 33 to server to vehicle 1 using relevant log 32 (processing of Figure 10).Therefore, because by confirming that log can confirm that the use resume of pervious vehicle 1, so can confirm that Whether it is illegally used with vehicle in front 1.
Response is made to the server connection request from portable terminal 33 and will be obtained constantly in user authentication function portion 57 Request is sent to portable terminal 33, based on information Tx at the time of acquirement via portable terminal 33 from server 32 to timer It is adjusted at the time of portion 54, whether (processing of Figure 11) is used in the appointment time based on time information Tx confirmation vehicle 1.Cause This, can precisely judge whether the use of vehicle 1 is correct.
At the time of cannot obtain from server 32 in the case where information Tx (when server connection failure), user authentication In the appointment time whether function part 57 (schemed based on the use for confirming vehicle 1 at the time of being currently held in timer portion 54 12 processing).Therefore, even if assuming server connection failure, whether in the appointment time also can confirm that the use of vehicle 1.
When having carried out the refund operation of vehicle 1, portable terminal 33 will be stored in the memory 45 of portable terminal 33 Key information Kd and information relevant to key information Kd (processing of Figure 13) are deleted.Therefore, because will after 1 use of vehicle Key information Kd and information deletion relevant to key information in the memory 45 of portable terminal 33, so not having key The worry that information Kd and information relevant to key information are stolen.In addition, vehicle sharing means 34 can also be deleted at this time Information in memory 53.
User authentication function portion 57 is correctly demodulating after the key information Kd that portable terminal 33 obtains, can be in vehicle Implement the coded communication (processing of Fig. 4) using user authentication key between sharing means 34 and portable terminal 33.Therefore, because In vehicle sharing means 34 to by the function of key portion of vehicle sharing means 34 since portable terminal 33 obtains key information Kd 56 be set as effectively until communication in can switch secret key, so further increasing the safety of communication.
In the communication with portable terminal 33 carried out after obtaining key information Kd, user authentication function portion 57 is using upper The old secret key used when primary communication connection is authenticated, if the certification is set up, old user authentication key is replaced with new user It authenticates key (processing of Fig. 5).Therefore, because use is updated when remotely operating every time to vehicle 1 using portable terminal 33 Family authenticates key, so can be further improved safety when vehicle 1 uses.
In addition, above embodiment can also be changed to following implementation.
Key information Kd is not limited to be encrypted using the intrinsic secret key of vehicle sharing means and be affixed to the shared dress of vehicle 34 are set, other secret keys also can be used and encrypted.
The content of key information Kd can be changed to the other content other than above embodiment.
The certification operation of step S210 is not limited to the example described in above embodiment, can also be changed to its other party Formula.
Key information Kd is not limited to be generated by server 32, can also be generated by other external device (ED)s.
Engine start operation for example can also show the button of " engine start " in the picture of portable terminal 33, by right The button and start to operate.
In electron key system 4 (intelligent calibration system), confirm that the method for the position of electron key 2 is not limited to make With the method for outdoor transmitter 16 and indoor transmitter 17.Such as it can also confirm in the left and right configuration LF antenna of vehicle body The response of electron key 2 when sending electric wave from each LF antenna, to judge that electron key 2 is in the car or outside vehicle.
Electron key system 4, which can also for example be used, executes ID verification using the communication from electron key 2 as opportunity Wireless key system.
Electron key 2 is not limited to Intelligent key (registered trademark), can also use wireless key.
Wireless near field communication is not limited to Bluetooth communication, can also be changed to other communication modes.
The communication mode used in each communication, frequency are not limited to the example described in above embodiment, can change Other communication modes, frequency.
Carried out using electron key system 4 ID verification be not limited to include challenge response certification ID verify, as long as The verification at least carrying out electron key ID, can also carry out any kind of certification, verification.
Key information Kd is not limited to disposable key, as long as limitation uses key information Kd.
The intrinsic secret key of vehicle sharing means, user authentication key, key for example also can be used in the secret key for being used for coded communication Any one secret key in the intrinsic secret key of spoon.In addition, the secret key used is not limited to the key described in the above-described embodiment.
If such as processing switch the secret key used on the way, be conducive to improve communication safety.
The carrying position of vehicle sharing means 34, which is not done, particularly to be limited.
Portable terminal 33 is not limited to high-performance mobile phone, can be changed to various terminals.
Description of symbols
1 ... vehicle, 2 ... electron keys, 3 ... machines, 4 ... electron key systems, 31 ... vehicle shared systems, 32 ... services Device, 33 ... portable terminals, 34 ... vehicle sharing means, 45 ... memories, 54 ... timer portions, 56 ... function of key portions, 57 ... User authentication function portion, Kd ... key information, Cx ... count value, Tx ... time information.

Claims (14)

1. a kind of vehicle shared system, wherein
Have vehicle sharing means, which includes function of key portion and user authentication function portion, the key function Energy portion is by executing the ID similarly handled via the electron key with the vehicle verification so as to being shared by multiple people The machine of vehicle is operated, and when the machine is operated by portable terminal, the user authentication function portion is via described portable Terminal and obtain and key information and the key information authenticated from external device (ED), if the certification of the key information is set up And the use of the vehicle is in the appointment time, then is set as in the function of key portion effectively,
The key information is generated as the information for only allowing temporarily to use.
2. vehicle shared system according to claim 1, wherein
The key information is generated as expendable disposable key is only allowed.
3. vehicle shared system according to claim 1 or 2, wherein
The key information is encrypted using the intrinsic intrinsic secret key of vehicle sharing means of the vehicle sharing means.
4. vehicle shared system according to claim 1 or 2, wherein
The external device (ED) is by network communication to the shared server being managed of the vehicle, the key information It is generated by the server.
5. vehicle shared system according to claim 1 or 2, wherein
When the function of key portion carries out ID verification by electron key system used coded communication in institute It states when portable terminal operates the machine of the vehicle and is carried out between the user authentication function portion and the portable terminal Encrypted communication function it is separated.
6. vehicle shared system according to claim 1 or 2, wherein
The key information includes that be used to detect the duplicate count value of reservation,
When the portable terminal operates the machine of the vehicle, the user authentication function portion confirms the key information The count value and judge whether the vehicle can be used.
7. vehicle shared system according to claim 1 or 2, wherein
The information at the time of key information includes notice current date and time,
The vehicle sharing means include that be used to confirm the timer portion of the subscription time,
The time information of the user authentication function portion based on the key information and at the time of to the timer portion into Row adjustment.
8. vehicle shared system according to claim 1 or 2, wherein
The key information includes the Termination ID of the portable terminal used as vehicle electronic key,
The Termination ID of the user authentication function portion based on the key information and confirm the portable terminal whether by with It is reserved in the use to the vehicle.
9. vehicle shared system according to claim 1 or 2, wherein
When the user authentication key for the coded communication being used between the portable terminal and the vehicle sharing means disappears, The portable terminal obtains the key information from the external device (ED) by the formality of re-issuing of the key information again Lay equal stress on user authentication key described in new login.
10. vehicle shared system according to claim 1 or 2, wherein
The user authentication function portion can notify the use with the vehicle via the portable terminal and to the external device (ED) Relevant log.
11. vehicle shared system according to claim 1 or 2, wherein
The vehicle sharing means include that be used to confirm the timer portion of the subscription time,
The user authentication function portion response is made to the external device (ED) connection request from the portable terminal and to it is described just It takes terminal sending instant and obtains request, it is right based on information at the time of acquirement via the portable terminal from the external device (ED) It is adjusted at the time of the timer portion, and confirms the use of the vehicle whether described based on the time information In subscription time.
12. vehicle shared system according to claim 11, wherein
The user authentication function portion is in the case where that cannot obtain from the time information of the external device (ED), based on working as Before confirm at the time of be held in the timer portion use of the vehicle whether in the subscription time.
13. vehicle shared system according to claim 1 or 2, wherein
The portable terminal deletes the storage for being stored in the portable terminal in the refund operation for having been carried out the vehicle The key information of device and information relevant to the key information.
14. a kind of vehicle sharing method comprising following steps:
The step of assigning the key information for only allowing temporarily to use to portable terminal from external device (ED);
By being arranged at the user authentication function portion of the vehicle sharing means of vehicle, the key is obtained from the portable terminal The step of information;
The step of key information is authenticated by the user authentication function portion;
The key information certification set up and the vehicle use in the appointment time in the case where, the vehicle is total to The function of key portion for enjoying device is set as effective step;
The step of verifying via the ID that the electron key with the vehicle is similarly handled is executed by the function of key portion;With And
In the case where the ID verification executed by the function of key portion is set up, the machine of the vehicle can be operated The step of.
CN201810671433.8A 2017-06-29 2018-06-26 Vehicle shared system and vehicle sharing method Pending CN109204227A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2017-127587 2017-06-29
JP2017127587A JP6908451B2 (en) 2017-06-29 2017-06-29 Car sharing system and car sharing method

Publications (1)

Publication Number Publication Date
CN109204227A true CN109204227A (en) 2019-01-15

Family

ID=64734755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810671433.8A Pending CN109204227A (en) 2017-06-29 2018-06-26 Vehicle shared system and vehicle sharing method

Country Status (3)

Country Link
US (1) US10668896B2 (en)
JP (1) JP6908451B2 (en)
CN (1) CN109204227A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685961A (en) * 2019-03-04 2019-04-26 北京车联天下信息技术有限公司 Virtual vehicle key management device and electronic equipment
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN110033538A (en) * 2019-03-06 2019-07-19 山东开创云软件有限公司 A kind of method for unlocking and its device of shared automobile
JP2019193303A (en) * 2018-04-24 2019-10-31 株式会社東海理化電機製作所 Key information generation system and key information generation method
CN111127706A (en) * 2019-11-28 2020-05-08 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111222954A (en) * 2020-01-09 2020-06-02 开能健康科技集团股份有限公司 Shared rental equipment and control method thereof, shared system and shared control method
CN111770046A (en) * 2019-03-26 2020-10-13 本田技研工业株式会社 Vehicle control device
CN113762553A (en) * 2020-06-01 2021-12-07 丰田自动车株式会社 Information processing device, authentication system, information processing method, and non-transitory storage medium
CN113763603A (en) * 2020-06-01 2021-12-07 丰田自动车株式会社 Information processing apparatus, information processing method, computer-readable storage medium, and portable terminal
CN113920625A (en) * 2021-10-18 2022-01-11 安徽江淮汽车集团股份有限公司 Vehicle NFC key authentication method
CN114364582A (en) * 2019-09-17 2022-04-15 本田技研工业株式会社 Vehicle control device, vehicle control method, vehicle control system, program, and storage medium
CN114401515A (en) * 2022-03-25 2022-04-26 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN115380149A (en) * 2020-03-31 2022-11-22 株式会社东海理化电机制作所 Communication system and communication method

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7166780B2 (en) * 2017-08-03 2022-11-08 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ VEHICLE CONTROL DEVICE, VEHICLE CONTROL METHOD AND PROGRAM
JP6717793B2 (en) * 2017-10-10 2020-07-08 株式会社東海理化電機製作所 Car sharing system and car sharing device
JP6950497B2 (en) * 2017-11-29 2021-10-13 トヨタ自動車株式会社 Relay device and its control method
JP7059631B2 (en) 2017-12-28 2022-04-26 トヨタ自動車株式会社 Car sharing system and car sharing method
JP2019191753A (en) * 2018-04-20 2019-10-31 株式会社東海理化電機製作所 Sharing system
JP2019190111A (en) 2018-04-24 2019-10-31 株式会社東海理化電機製作所 Key information generation system and key information generation method
JP6640906B2 (en) * 2018-04-24 2020-02-05 株式会社東海理化電機製作所 Key information generation system and key information generation method
JP6958480B2 (en) * 2018-05-21 2021-11-02 株式会社デンソー Vehicle authentication device
DE102018010140A1 (en) * 2018-12-27 2020-07-02 Volkswagen Aktiengesellschaft Concept for providing a key signal or an immobilizer signal for a vehicle
KR20200089562A (en) * 2019-01-17 2020-07-27 삼성전자주식회사 Method and apparatus for managing a shared digital key
WO2020174544A1 (en) * 2019-02-25 2020-09-03 本田技研工業株式会社 Vehicle, vehicle onboard device, and management method
KR102191785B1 (en) * 2019-02-25 2020-12-16 (주)디지파츠 Smartkey signal control device of carsharing vehicle and system thereof
JP2020142762A (en) * 2019-03-08 2020-09-10 株式会社デンソー Authentication device and management system
US10967836B2 (en) * 2019-03-21 2021-04-06 Denso International America, Inc. Phone as a key vehicle access based on time policies, license information and validation and accuracy of a vehicle real time clock
WO2020202355A1 (en) * 2019-03-29 2020-10-08 本田技研工業株式会社 Vehicle management system, server, vehicle management method, communication terminal, and program
CN110126780A (en) * 2019-05-16 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Intelligent key operating system and method
JP6833906B2 (en) * 2019-05-28 2021-02-24 Necプラットフォームズ株式会社 Wireless systems, wireless system control methods and wireless system control programs
JP6906030B2 (en) * 2019-07-18 2021-07-21 株式会社東海理化電機製作所 Servers, authentication devices, and authentication systems
CN110740186A (en) * 2019-10-25 2020-01-31 北京首汽智行科技有限公司 automobile key anti-dismounting device and system
JP7380430B2 (en) * 2020-06-01 2023-11-15 トヨタ自動車株式会社 Information processing device, information processing method, and program
CN113442871A (en) * 2021-06-30 2021-09-28 重庆长安新能源汽车科技有限公司 NFC-based keyless entry method and system
US11657338B2 (en) 2021-10-22 2023-05-23 Geotab Inc. Systems for shared vehicle access
US11787367B1 (en) 2022-04-07 2023-10-17 Geotab Inc. Systems for shared vehicle access
US11814010B1 (en) 2022-08-29 2023-11-14 Geotab Inc. Devices for shared vehicle access

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248231A1 (en) * 2004-07-08 2007-10-25 Kabushiki Kaisha Toshiba Storage Medium Processing Method, Storage Medium Processing Device, and Program
JP2011044112A (en) * 2009-08-24 2011-03-03 Tokai Rika Co Ltd Car sharing system
CN103204134A (en) * 2012-01-11 2013-07-17 株式会社东海理化电机制作所 Vehicle operation authorization system and vehicle operation authorization controlling method
JP2013257653A (en) * 2012-06-11 2013-12-26 Toyota Infotechnology Center Co Ltd Car sharing system, communication terminal, communication program, and communication method
US20140266594A1 (en) * 2013-03-14 2014-09-18 The Crawford Group, Inc. Smart Key Emulation for Vehicles
CN105539364A (en) * 2015-12-23 2016-05-04 奇瑞汽车股份有限公司 Vehicle control method and system
JP2016208494A (en) * 2016-02-01 2016-12-08 株式会社 ディー・エヌ・エー System and method for managing vehicle

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005155236A (en) * 2003-11-27 2005-06-16 Sharp Corp Lock opening and closing control system
JP2006112118A (en) * 2004-10-14 2006-04-27 Fuji Photo Film Co Ltd Lock device
US20110140839A1 (en) * 2009-12-11 2011-06-16 Honda Motor Co., Ltd. Method and system for disabling passive entry key located inside a vehicle
JP2012229560A (en) * 2011-04-26 2012-11-22 Tokai Rika Co Ltd Key wireless authentication system
DE112011105869B4 (en) * 2011-11-22 2016-10-06 Mitsubishi Electric Corporation Electronic key system and lock-side terminal and portable terminal used in same
US9002536B2 (en) * 2013-03-14 2015-04-07 Ford Global Technologies, Llc Key fob security copy to a mobile phone
KR20160022039A (en) * 2014-08-19 2016-02-29 현대자동차주식회사 Smart key control system and method for vehicle
DE112015004537T5 (en) 2014-10-01 2017-06-14 Denso Corporation Car sharing system and in-vehicle device for car sharing system
JP6277949B2 (en) 2014-10-01 2018-02-14 株式会社デンソー Car sharing system and in-vehicle device for car sharing system
JP6387819B2 (en) 2014-12-12 2018-09-12 株式会社デンソー In-vehicle device and car sharing system
KR20170077328A (en) * 2015-12-28 2017-07-06 현대자동차주식회사 System and method for management of vehicle

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248231A1 (en) * 2004-07-08 2007-10-25 Kabushiki Kaisha Toshiba Storage Medium Processing Method, Storage Medium Processing Device, and Program
JP2011044112A (en) * 2009-08-24 2011-03-03 Tokai Rika Co Ltd Car sharing system
CN103204134A (en) * 2012-01-11 2013-07-17 株式会社东海理化电机制作所 Vehicle operation authorization system and vehicle operation authorization controlling method
JP2013257653A (en) * 2012-06-11 2013-12-26 Toyota Infotechnology Center Co Ltd Car sharing system, communication terminal, communication program, and communication method
US20140266594A1 (en) * 2013-03-14 2014-09-18 The Crawford Group, Inc. Smart Key Emulation for Vehicles
CN105539364A (en) * 2015-12-23 2016-05-04 奇瑞汽车股份有限公司 Vehicle control method and system
JP2016208494A (en) * 2016-02-01 2016-12-08 株式会社 ディー・エヌ・エー System and method for managing vehicle

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019193303A (en) * 2018-04-24 2019-10-31 株式会社東海理化電機製作所 Key information generation system and key information generation method
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN109685961A (en) * 2019-03-04 2019-04-26 北京车联天下信息技术有限公司 Virtual vehicle key management device and electronic equipment
CN110033538A (en) * 2019-03-06 2019-07-19 山东开创云软件有限公司 A kind of method for unlocking and its device of shared automobile
CN111770046A (en) * 2019-03-26 2020-10-13 本田技研工业株式会社 Vehicle control device
CN111770046B (en) * 2019-03-26 2022-11-22 本田技研工业株式会社 Vehicle control device
CN114364582B (en) * 2019-09-17 2023-09-12 本田技研工业株式会社 Vehicle control device, vehicle control method, vehicle control system, and storage medium
CN114364582A (en) * 2019-09-17 2022-04-15 本田技研工业株式会社 Vehicle control device, vehicle control method, vehicle control system, program, and storage medium
CN111127706A (en) * 2019-11-28 2020-05-08 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111222954A (en) * 2020-01-09 2020-06-02 开能健康科技集团股份有限公司 Shared rental equipment and control method thereof, shared system and shared control method
CN115380149A (en) * 2020-03-31 2022-11-22 株式会社东海理化电机制作所 Communication system and communication method
CN113763603A (en) * 2020-06-01 2021-12-07 丰田自动车株式会社 Information processing apparatus, information processing method, computer-readable storage medium, and portable terminal
CN113762553A (en) * 2020-06-01 2021-12-07 丰田自动车株式会社 Information processing device, authentication system, information processing method, and non-transitory storage medium
CN113763603B (en) * 2020-06-01 2023-12-15 丰田自动车株式会社 Information processing apparatus, information processing method, computer-readable storage medium, and portable terminal
CN113762553B (en) * 2020-06-01 2024-01-05 丰田自动车株式会社 Information processing apparatus, authentication system, information processing method, and non-transitory storage medium
CN113920625A (en) * 2021-10-18 2022-01-11 安徽江淮汽车集团股份有限公司 Vehicle NFC key authentication method
CN114401515B (en) * 2022-03-25 2022-08-12 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN114401515A (en) * 2022-03-25 2022-04-26 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key

Also Published As

Publication number Publication date
US20190001926A1 (en) 2019-01-03
JP6908451B2 (en) 2021-07-28
JP2019012338A (en) 2019-01-24
US10668896B2 (en) 2020-06-02

Similar Documents

Publication Publication Date Title
CN109204227A (en) Vehicle shared system and vehicle sharing method
CN105976466B (en) Automobile entrance guard door opening method
JP6588518B2 (en) Car sharing system
CN109586915A (en) Automobile no-key controls authentication method, user terminal, car-mounted device and server
US11142166B2 (en) Sharing system using valet key
JP2019012337A (en) Car sharing system and car sharing program
CN109649332B (en) Vehicle sharing system
CN109649330B (en) Vehicle sharing system
JP6676597B2 (en) Car sharing system
CN103390297A (en) Multiple security control security system and security information processing method
US10315624B2 (en) Button assembly device for controlling access to a vehicle
CN204759556U (en) Access control ware
JP4739924B2 (en) Electronic key system
CN110015265A (en) Secondary key and secondary key control method
JP6993186B2 (en) Car sharing system
CN109774654A (en) Secondary key and secondary key control method
WO2019202929A1 (en) Sharing system
JP2021114133A (en) Car sharing system and car sharing method
WO2024029285A1 (en) User authentication method, user authentication digital key system, and mobile device program
KR102040560B1 (en) Vehicle Starting System with Electric Field Communication and LF Communication by using Smart Key and Method thereof
JP6663886B2 (en) Car sharing system
CN111862406A (en) Intelligent key, intelligent system and intelligent system using method
CN113568392A (en) Automobile remote control system
JP2020046812A (en) Authentication system and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination